Font Size: a A A

Detection Of DDOS Based On Hidden Markov Model For TCP Protocol

Posted on:2014-07-18Degree:MasterType:Thesis
Country:ChinaCandidate:C L WangFull Text:PDF
GTID:2208330422988348Subject:Computer software and theory
Abstract/Summary:PDF Full Text Request
DoS (denial of service attacks), it is a network attack in decade.The attack aimis overwhelm the host resources (communication resources, the host resources), dueto cannot provide services for legitimate users. DDoS (distributed denial of serviceattacks), it is based on DoS, using hacker Trojans control and commands thecomputer (puppets computer) in the different region attack the target computer, let thehost and network is unavailable. SYN floods are the most common method in theDDoS (distributed denial of service attack), very destructive. SYN floods attacks inthe TCP is adopting the three-way handshake protocol, when attacking, the services isin semi-connected state, so as to consume the server’s Network, memory, computingconnection etc..Because of the detection method of DDoS has some problem atpresent, so the paper based on the model of HiddenHidden Markov forecast the TCPDDoS This model according to the character built that connection count, connectionstate and duration in the experiment. And as to the Server-side TCP connection statetable, connection request and duration monitor and analyze real-time. Once appearssemi-connected, connection request and duration beyond threshold range, the alarm ison the issue, remind the manager deal with and monitor, or automatic stop and releasethe resource semi-connected occupy, and ultimately prevent DDoS attacks. It usesless memory and computing resources, and that can be placed on the server, or on thefirewall after improvements.This paper base on the SYN floods attacks DdoS research, the main work asfollows:I. Collect and analyze TCP’s connection requests, semi-connected state and etl.As to the character of attack classify, summary and statistic.II. Adopting Hidden Markov Model analyzes SYN flooding attack and buildmodel.III.Experiment.as to TCP SYN flooding attacking analyze and predict.
Keywords/Search Tags:SYN floods, TCP, intrusion detection, DDoS
PDF Full Text Request
Related items